The Wayback Machine - https://web.archive.org/web/20140630043242/http://www.codeguru.com/csharp/.net/net_general/comcom/

Latest COM/COM+ Articles

Build a Managed BHO and Plug into the Browser

Browser Helper Objects (BHOs) are COM components that communicate with Internet Explorer to enrich the browsing experience. Michele Leroux Bustamante returns to the world of COM to show you how to build a managed BHO with the help of the .NET Framework's COM interoperability features.

Simplify Application Deployment with Registration-Free COM

In the days before .NET, COM's dependency on the Registry and its backward compatibility issues were the Achilles' heels of Win32 development. Learn a technique for deploying your existing COM components without the pain traditionally associated with the Registry.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Services Made Easy

Discover how to easily create and add WIN32 Services in .NET. You’ll also discover the Topshelf toolkit.

Top White Papers and Webcasts

  • The continued high frequency of successful cyberattacks against today's enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. With a Zero Trust security model, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of location. This white paper discusses the need for a Zero Trust approach …

  • For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how DDoS attacks have evolved in both strategy …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds